Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro security 2019 vulnerabilities and exploits
(subscribe to this query)
570
VMScore
CVE-2021-25246
An improper access control information disclosure vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG SP1, and Worry-Free Business Security could allow an unauthenticated user to create a bogus agent on an affected server that could be used then make valid...
Trendmicro Officescan Xg
Trendmicro Apex One 2019
Trendmicro Worry-free Business Security 10.0
445
VMScore
CVE-2021-25228
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about hotfix history.
Trendmicro Officescan Xg
Trendmicro Apex One 2019
Trendmicro Worry-free Business Security 10.0
454
VMScore
CVE-2019-14688
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable duri...
Trendmicro Control Manager 7.0
Trendmicro Endpoint Sensor 1.6
Trendmicro Im Security 1.6.5
Trendmicro Mobile Security 9.8
Trendmicro Officescan Xg
Trendmicro Scanmail 14.0
Trendmicro Security 2019
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
578
VMScore
CVE-2019-18191
A privilege escalation vulnerability in the Trend Micro Deep Security as a Service Quick Setup cloud formation template could allow an authenticated entity with certain unrestricted AWS execution privileges to escalate to full privileges within the target AWS account.
Trendmicro Deep Security As A Service -
356
VMScore
CVE-2019-9490
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability.
Trendmicro Interscan Web Security Virtual Appliance 6.5
NA
CVE-2022-40142
A security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local malicious user to create a writable folder in an arbitrary location and escalate privileges on affected installations. Pleas...
Trendmicro Apex One 2019
Trendmicro Apex One -
NA
CVE-2023-32556
A link following vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local malicious user to disclose sensitive information. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to ...
Trendmicro Apex One
Trendmicro Apex One 2019
NA
CVE-2023-25145
A link following vulnerability in the scanning function of Trend Micro Apex One agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in...
Trendmicro Apex One
Trendmicro Apex One 2019
NA
CVE-2023-25146
A security agent link following vulnerability in the Trend Micro Apex One agent could allow a local malicious user to quarantine a file, delete the original folder and replace with a junction to an arbitrary location, ultimately leading to an arbitrary file dropped to an arbitrar...
Trendmicro Apex One
Trendmicro Apex One 2019
NA
CVE-2023-25148
A security agent link following vulnerability in Trend Micro Apex One could allow a local malicious user to exploit the vulnerability by changing a specific file into a pseudo-symlink, allowing privilege escalation on affected installations. Please note: an attacker must first ob...
Trendmicro Apex One
Trendmicro Apex One 2019
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »